210 likes | 239 Views
7 th Workshop on the Cross-border Disaster eResponse in the eRegion Human Aspects of Cross-border Disaster eResponse – A Part of the Regional Security and Defence. Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009.
E N D
7th Workshop on the Cross-border Disaster eResponse in the eRegionHuman Aspects of Cross-border Disaster eResponse –A Part of the Regional Security and Defence Radica A. Gareva, PhD Ministry of Defense of The Republic of Macedonia Skopje, May 5, 2009
The rapid advancement of the computer technology has a great influence over the Dynamic arm competition, thus changing the safety environment and the national values and interests. Cyber Security – New aspect of the Regional Security and the Human being safety
WHY? • Third wave of development – INFORMATION SOCIETY: • Digital & • Networked • The KEY FOR SUCCESS IN IT SOCIETY: “INFORMATION DOMINANCE”.
WE HAVE TO FACE WITH: TRENDS, CHALLENGES & PRIORITIES OF THE REGIONAL SECURITY IN 21st CENTURY
TRENDS: • Globalization; • Cooperation & integration of the world politics; • Internet; • IT influence on the economy; • SHARED SERVICES – A Key Trend • CYBERSPACE – NEW Unconventional Disaster BATTLEFIELD; • Cyber Crime – global terrorist trend • Changed National interests and values under the wave of IT;
CHALLENGES (1): • Societal Development – iGovernment • Modernization of the IT Infrastructure; • Efficiency and Transparency Increasing • Government Service Delivery Transformation
CHALLENGES (2): • CYBERWAR – “the fifth dimension of the war”; • Humanbeing in the focus of the Cross-border Disaster eResponse
CYBERWAR • A serial of consecutive actions according the national military strategy for information superiority and jeopardizing enemy’s information systems; • Achievement of goals by IT; • Societal level which could cause organized conflict between two parties, or two or more nations, among widespread and connected information and communication means.
CYBERTHERORIZM • Violence or threaten to innocent victims because of political or social goals, by IT.
CYBERCRIME: • Criminal action which is planned, coordinated and executed in the cyberspace, by methods, skills and IT knowledge, because of some subjective, political or economic goals. CRIMINAL ACTION in cyberspace is: • Unauthorized access to computer networks and systems; • Disruption of computer’s programs or data; • Computer sabotage; • Computer espionage; • Unauthorized communication interruption; • Theft of invisible assets; etc.
CYBERCRIME CATHEGORIES: • Crimes which cause physical harm or potentional physical harm and violence; & • Crimes without harm and violence.
Crimes which cause harms and/or potentional physical loss and violence, by Internet and other IT tools: • Cyberterrorism; • Attack by threat, by e-mail; • Cyber stalking; • Child pornography;
UNVIOLENCED CYBERCRIME: • Unauthorized access to the computer systems, because of entertainment or personal attacker challenge; • Cyberspace theft, which includes: • Transfer of money from the company’s bill to the own bill of the attacker, by internal attacker; • Endorse of checks, documents, etc. from external intruders; • Corporative / industrial espionage; • Plagiarism; • Identity theft; • Unauthorized network services interruption;
Destructive attacks which mainstream is only services disruption, without information theft, as: • hacking; • hacking and web-site vandalizing; • viruses, worms & Trojans; etc. • Cyber prostitution with virtual sexual services; • Betting, which is connected with risk of money; • Illegal international transfer of money, documents, cryptographic software, etc.
PRIORITIES: • Paradigm of Security Strategy Changing; • Awareness and global security culture developing in the new security environment; • Critical Information Infrastructure Threats and Risks management;
WHO HAS TO FIGHT AGAINST THE CYBER CRIME and TO PROTECT THE HUMANBEING ? • The Government, politicians and jurisdictional institutions; • Professionals from the Criminality Department; • IT professionals; & • The whole community in general and IT Society separated.
WHERE to start from? (1) • Global culture and Cyber space security awareness developing in the Region and wider; • Corporative security policies developing in the RM & Region, with aim procedures and best cyber security management practices to be shared; • Paradigm security strategy changing; • Threats & Risks Management Paradigm creating; • G8 principles Implementation;
WHERE to start from? (2) • “Framework for Cooperation on Cyber Defense between NATO and Partner Nations” based on the principles set out in the: - “NATO Policy on Cyber Defense” & - “Council Guidelines for Cooperation on Cyber Defense with Partner Nations and International Organizations, which were approved by the NAC in January and July 2008, respectively.
WHERE to start from?(3) • INDIVIDUAL SECURITY – nucleus of National Security; • CYBER SECURITY – nucleus of corporative security; • INDIVIDUAL & CYBER SECURITY – fundament of National & Regional Security.
That’s why, understanding the Human Aspects of Cross-border Disaster eResponse as A Part of the Regional Security and Defense, an extended concept of the National and Regional Security is suggested: • Political aspect; • Economic aspect; • Societal aspect; • Military aspect; • Ecological aspect; & • Cyber aspect.